Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Set-up.exe

Overview

General Information

Sample name:Set-up.exe
Analysis ID:1579084
MD5:0a711206f96133c8d28cd99b5910d705
SHA1:a100de5f4dc7a8faf50a5f6292f088c22e943303
SHA256:3e8ce55b21c44c397fe6080de6dec506f468c011c05808a72e8d8a64af090a46
Tags:exeuser-aachum
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
HTTP GET or POST without a user agent
IP address seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files

Classification

  • System is w10x64
  • Set-up.exe (PID: 1644 cmdline: "C:\Users\user\Desktop\Set-up.exe" MD5: 0A711206F96133C8D28CD99B5910D705)
    • WerFault.exe (PID: 2748 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 940 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Set-up.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.6% probability
Source: Set-up.exe, 00000000.00000000.2076667996.0000000000FAD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_e8e96d15-f
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: Joe Sandbox ViewIP Address: 34.226.108.155 34.226.108.155
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficDNS traffic detected: DNS query: httpbin.org
Source: global trafficDNS traffic detected: DNS query: home.sevkx17vs.top
Source: Set-up.exeString found in binary or memory: http://.css
Source: Set-up.exeString found in binary or memory: http://.jpg
Source: Set-up.exeString found in binary or memory: http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl17
Source: Set-up.exe, 00000000.00000002.3256005082.0000000001514000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.3255604271.0000000000FAB000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl1733056027
Source: Set-up.exe, 00000000.00000002.3256005082.0000000001514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl173305602735a1
Source: Set-up.exe, 00000000.00000002.3256005082.0000000001514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl17330560276963
Source: Set-up.exe, 00000000.00000002.3255604271.0000000000FAB000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl1733056027http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFa
Source: Set-up.exeString found in binary or memory: http://html4/loose.dtd
Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ip
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ipbefore
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: C:\Users\user\Desktop\Set-up.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 940
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
Source: classification engineClassification label: mal56.evad.winEXE@2/5@14/1
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1644
Source: C:\Users\user\Desktop\Set-up.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\bf917ac0-f24a-45e4-ac09-b83b1288ae67Jump to behavior
Source: Set-up.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Set-up.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Set-up.exeReversingLabs: Detection: 34%
Source: Set-up.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectorysystem_win32.c@
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: 8L0123456789abcdefin-addr.arpaip6.arpa
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: JM[\Unable to allocate space for channel dataFailed allocating memory for channel type nameUnable to allocate temporary space for packetWould block sending channel-open requestUnable to send channel-open requestWould blockUnexpected errorUnexpected packet sizeChannel open failure (administratively prohibited)Channel open failure (connect failed)Channel open failure (unknown channel type)Channel open failure (resource shortage)Channel open failureUnable to allocate memory for setenv packetcancel-tcpip-forwardWould block sending forward requestUnable to send global-request packet for forward listen requestauth-agent-req@openssh.comauth-agent-reqcdChannel can not be reusedUnable to allocate memory for channel-process requestWould block sending channel requestUnable to send channel requestFailed waiting for channel successUnable to complete request for channel-process-startupUnexpected packet lengthUnable to allocate memory for signal nameWould block sending window adjustUnable to send transfer-window adjustment packet, deferringtransport readwould blockWe have already closed this channelEOF has already been received, data might be ignoredFailure while draining incoming flowUnable to send channel dataUnable to send EOF, but closing channel anywayWould block sending close-channelUnable to send close-channel request, but closing anywaysessionchannel.cUnable to allocate memory for direct-tcpip connectiondirect-tcpipUnable to allocate memory for direct-streamlocal connectiondirect-streamlocal@openssh.comQR0.0.0.0tcpip-forwardWould block sending global-request packet for forward listen requestUnknownUnable to allocate memory for listener queueUnable to complete request for forward-listenWould block waiting for packetChannel not foundcdenvWould block sending setenv requestUnable to send channel-request packet for setenv requestFailed getting response for channel-setenvUnable to complete request for channel-setenvcdWould block sending auth-agent requestUnable to send auth-agent requestFailed to request auth-agentUnable to complete request for auth-agentcdterm + mode lengths too largepty-reqWould block sending pty requestUnable to send pty-request packetFailed to require the PTY packageUnable to complete request for channel request-ptywindow-changeWould block sending window-change requestUnable to send window-change packetcdUnable to allocate memory for pty-requestx11-reqMIT-MAGIC-COOKIE-1Unable to get random bytes for x11-req cookie%02XWould block sending X11-req packetUnable to send x11-req packetwaiting for x11-req response packetUnable to complete request for channel x11-reqWould block sending EOFUnable to send EOF on channelReceiving channel window has been exhausted_libssh2_transport_read() bailed out!libssh2_channel_wait_closed() invoked when channel is not in EOF stateUnable to allocate memory for signal requestsignalWould block sending signal requestUnable to send signal packetecdsa-sha2-nistp256ecdsa-sha2-nistp384ecdsa-sha2-nistp521blocksize <= siz
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: unknownProcess created: C:\Users\user\Desktop\Set-up.exe "C:\Users\user\Desktop\Set-up.exe"
Source: C:\Users\user\Desktop\Set-up.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 940
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: Set-up.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Set-up.exeStatic file information: File size 8020992 > 1048576
Source: Set-up.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4bba00
Source: Set-up.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x15f200
Source: Set-up.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x150a00
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Set-up.exeStatic PE information: section name: .eh_fram
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: Set-up.exeBinary or memory string: PROCMON.EXE
Source: Set-up.exeBinary or memory string: X64DBG.EXE
Source: Set-up.exeBinary or memory string: WINDBG.EXE
Source: Set-up.exeBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
Source: Set-up.exeBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\Set-up.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Set-up.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: Amcache.hve.6.drBinary or memory string: VMware
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Set-up.exeBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
Source: Set-up.exe, 00000000.00000003.2102842262.00000000008D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Set-up.exe, 00000000.00000002.3256752642.0000000003630000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.6.drBinary or memory string: vmci.sys
Source: Set-up.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: VMware20,1
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Set-up.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Set-up.exe, Set-up.exe, 00000000.00000000.2076667996.0000000000FAD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
Source: Set-up.exe, Set-up.exe, 00000000.00000000.2076667996.0000000000FAD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe
Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping121
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Remote System Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets13
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Set-up.exe34%ReversingLabsWin32.Infostealer.Tinba
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
httpbin.org
34.226.108.155
truefalse
    high
    home.sevkx17vs.top
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://httpbin.org/ipfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://curl.se/docs/hsts.htmlSet-up.exefalse
          high
          http://html4/loose.dtdSet-up.exefalse
            high
            http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl173305602735a1Set-up.exe, 00000000.00000002.3256005082.0000000001514000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://httpbin.org/ipbeforeSet-up.exefalse
                high
                https://curl.se/docs/http-cookies.htmlSet-up.exefalse
                  high
                  http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl17330560276963Set-up.exe, 00000000.00000002.3256005082.0000000001514000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://upx.sf.netAmcache.hve.6.drfalse
                      high
                      https://curl.se/docs/alt-svc.htmlSet-up.exefalse
                        high
                        http://.cssSet-up.exefalse
                          high
                          http://.jpgSet-up.exefalse
                            high
                            http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl17Set-up.exefalse
                              unknown
                              http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl1733056027http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaSet-up.exe, 00000000.00000002.3255604271.0000000000FAB000.00000004.00000001.01000000.00000003.sdmpfalse
                                unknown
                                http://home.sevkx17vs.top/WyoRLrMUJoZvgmxxFaXl1733056027Set-up.exe, 00000000.00000002.3256005082.0000000001514000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.3255604271.0000000000FAB000.00000004.00000001.01000000.00000003.sdmpfalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  34.226.108.155
                                  httpbin.orgUnited States
                                  14618AMAZON-AESUSfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1579084
                                  Start date and time:2024-12-20 19:27:03 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 6m 14s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Run name:Run with higher sleep bypass
                                  Number of analysed new started processes analysed:8
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Set-up.exe
                                  Detection:MAL
                                  Classification:mal56.evad.winEXE@2/5@14/1
                                  EGA Information:Failed
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 52.182.143.212, 13.107.246.63, 172.202.163.200, 20.190.147.7
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target Set-up.exe, PID 1644 because there are no executed function
                                  • VT rate limit hit for: Set-up.exe
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  34.226.108.155file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                    Set-up.exeGet hashmaliciousUnknownBrowse
                                      KNkr78hyig.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                        Tsy9P2T9yF.exeGet hashmaliciousUnknownBrowse
                                          kGxQbLOG7s.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                            HHFgVU1HGu.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                              GxSEtDSBuK.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                ob4eL9Z1O4.exeGet hashmaliciousCryptbotBrowse
                                                  nojxbVm8i4.exeGet hashmaliciousCryptbotBrowse
                                                    WP6s7cCLzr.exeGet hashmaliciousUnknownBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      httpbin.orgSet-up.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Set-up.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Set-up.exeGet hashmaliciousUnknownBrowse
                                                      • 34.226.108.155
                                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, SystemBC, zgRATBrowse
                                                      • 98.85.100.80
                                                      t3VyxF5MmA.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      KNkr78hyig.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 34.226.108.155
                                                      Pm81aa8zii.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      avBx6p1FAX.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 98.85.100.80
                                                      Tsy9P2T9yF.exeGet hashmaliciousUnknownBrowse
                                                      • 34.226.108.155
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      AMAZON-AESUSfile.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                      • 34.226.108.155
                                                      Set-up.exeGet hashmaliciousUnknownBrowse
                                                      • 34.226.108.155
                                                      phish_alert_iocp_v1.10.16(15).emlGet hashmaliciousUnknownBrowse
                                                      • 44.217.82.191
                                                      nshkarm5.elfGet hashmaliciousMiraiBrowse
                                                      • 54.24.234.33
                                                      nshkmips.elfGet hashmaliciousMiraiBrowse
                                                      • 54.134.19.128
                                                      nshkarm.elfGet hashmaliciousMiraiBrowse
                                                      • 54.236.222.80
                                                      KNkr78hyig.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 34.226.108.155
                                                      Tsy9P2T9yF.exeGet hashmaliciousUnknownBrowse
                                                      • 34.226.108.155
                                                      nshkppc.elfGet hashmaliciousMiraiBrowse
                                                      • 54.136.161.117
                                                      kGxQbLOG7s.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                                      • 34.226.108.155
                                                      No context
                                                      No context
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):65536
                                                      Entropy (8bit):0.9298002643569154
                                                      Encrypted:false
                                                      SSDEEP:192:WfsS9aO0BU/wj4ZrMso5wzuiFwZ24IO8L:Wk4a1BU/wjuzuiFwY4IO8L
                                                      MD5:FBC18BE85027F0B84F5AEF94A989F0A7
                                                      SHA1:D561DF5FA5791AAFAE9A8C7B66A89330A9F67A8C
                                                      SHA-256:48616F1C8912F919D23DF7C9F3FC95EB037A49465D13F7DE190051CC38280A07
                                                      SHA-512:23ADA2E884AFA5A13971A56C7973D000CC9093B8CD1D273DF24A95B4A71070ECA78418A3778F82A25A87E4C2DFCDEA6EFD6250AA0CA20403455AEFAE754873B5
                                                      Malicious:true
                                                      Reputation:low
                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.1.9.2.9.4.0.7.2.6.1.6.6.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.1.9.2.9.4.1.1.3.2.4.1.0.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.9.9.7.7.5.f.f.-.e.1.7.2.-.4.3.8.1.-.a.1.d.4.-.c.3.c.d.0.4.3.7.2.e.e.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.6.2.0.5.8.a.c.-.2.5.6.1.-.4.8.f.a.-.8.b.1.d.-.1.b.3.2.e.b.7.3.b.1.c.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.t.-.u.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.6.6.c.-.0.0.0.1.-.0.0.1.4.-.b.6.d.3.-.d.4.e.3.0.c.5.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.7.b.a.1.5.1.0.9.b.6.9.3.2.d.7.6.c.b.3.8.f.e.0.1.d.a.1.0.a.2.2.0.0.0.0.f.f.f.f.!.0.0.0.0.a.1.0.0.d.e.5.f.4.d.c.7.a.8.f.a.f.5.0.a.5.f.6.2.9.2.f.0.8.8.c.2.2.e.9.4.3.3.0.3.!.S.e.t.-.u.p...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:Mini DuMP crash report, 15 streams, Fri Dec 20 18:29:00 2024, 0x1205a4 type
                                                      Category:dropped
                                                      Size (bytes):54406
                                                      Entropy (8bit):2.205037394752686
                                                      Encrypted:false
                                                      SSDEEP:384:Im15hfMGBkQ2a055vbn0COE018W+MNGzj:IW5lMGBkQ2a0/bnOEY+MUH
                                                      MD5:92E8CCD1A5FB80B592D43499BC404917
                                                      SHA1:101B2BA95400A0DE74AB1AC75CE2A7B06573BABC
                                                      SHA-256:781AA00069ED817790D28462D74A7BC9409B1FFB854445A189D739A8F70ECE24
                                                      SHA-512:EE307BA99C9161949FB2EF813988CB3F978BAE23B4771E36D255D4EEEC8EFCA4689718E41EE6DCEACD14AA8D70C2163EC2446BAE6F41D55D4FA8C8764D70D1FA
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:MDMP..a..... .......l.eg....................................................~/..........`.......8...........T............%..n.......................................................................................................eJ..............GenuineIntel............T.......l...,.eg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):8314
                                                      Entropy (8bit):3.693898255544034
                                                      Encrypted:false
                                                      SSDEEP:192:R6l7wVeJEe6IUI6YEIuSU91gmf2b4prH89bV3sfZrVHm:R6lXJ16IUI6YERSU91gmf2bFV8fZr4
                                                      MD5:9CA1ABD1E9600CFB223ABF7385F1656C
                                                      SHA1:E1EC90E074C8898E9861DE35527F8A5228BF5444
                                                      SHA-256:FD71CDBBD86488F77DE73C227AA03821CDAF910E40FCA8AA8A4427A82AECCB2C
                                                      SHA-512:061BBB7FFB5EE8ECE3AE08889702FC1A0C270314385D149EE7FC7F91BFDCE219F880D61240391D27BD61D6613863B530957E0523B38D5293B4FEE1C41E369EF1
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.6.4.4.<./.P.i.
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):4574
                                                      Entropy (8bit):4.449306470757221
                                                      Encrypted:false
                                                      SSDEEP:48:cvIwWl8zsPJg77aI9ZqFRWpW8VYRYm8M4JG5F4m+q8My4URwid:uIjfxI7vqFA7VpJrmK4URwid
                                                      MD5:C0ABC5F40E336EE3D8146ACBE97A7A6D
                                                      SHA1:2F9F3A55493750AE31A5D7B8446EBE93E7CE5988
                                                      SHA-256:0202137F906A069DC3C9E802523993BD559AF9A15D731190DE999848083FF2C4
                                                      SHA-512:4EAB9C7E2EE3585CC1FFFE9BC520607A49B43A4E3F6DF63678EC9800B0898AC84785C845A9E557BABB9D98E0F7A4E456B069720A7F1BB7CE30FA7D9E82DB18A3
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="639931" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                      File Type:MS Windows registry file, NT/2000 or above
                                                      Category:dropped
                                                      Size (bytes):1835008
                                                      Entropy (8bit):4.421497321443579
                                                      Encrypted:false
                                                      SSDEEP:6144:OSvfpi6ceLP/9skLmb0OTdWSPHaJG8nAgeMZMMhA2fX4WABlEnNQ0uhiTw:tvloTdW+EZMM6DFyC03w
                                                      MD5:989253D87980015FE2F86412AC488225
                                                      SHA1:D791EA0F2BE2CE6149CF737AFB57069D4D8C185F
                                                      SHA-256:75BE83B49CC6EB867E0AB5D52A99793B4C05C9B19EA51478C08BA41928A828A2
                                                      SHA-512:0C37EEB6CE84BD3A281758424A75EA5A4883675910C77F04C5E335710DE3756D3CFCEBDAFEF9E3ABB828074CE2F6AC4BF9426D6CCC72D07B9A80790AF8290C56
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmF....S...............................................................................................................................................................................................................................................................................................................................................V.>........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                      Entropy (8bit):5.780316844080178
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.53%
                                                      • InstallShield setup (43055/19) 0.43%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:Set-up.exe
                                                      File size:8'020'992 bytes
                                                      MD5:0a711206f96133c8d28cd99b5910d705
                                                      SHA1:a100de5f4dc7a8faf50a5f6292f088c22e943303
                                                      SHA256:3e8ce55b21c44c397fe6080de6dec506f468c011c05808a72e8d8a64af090a46
                                                      SHA512:03e63875a95e9d18d67635388611862a6694278038134a0e4ab8b23c43a41774b33f3dcc38181bd4af6491b66a7f91b478820b1bc7b14d31e42f20779b9a506a
                                                      SSDEEP:49152:Kucd9+zV4r7CLX0vDLhfFoGiux88wMKowWrpAXa9UWsnmWPh/pU02KbbgcPyzJsL:KumEwCLofapuG8nKjGGXx/qKxyz2
                                                      TLSH:10863B62EE8781F9C6C305715056B73F6E31AF009925CEB6CE91FB38C672A11E95E21C
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....WLg...............(..K..`z..2............K...@...........................z......hz...@... ............................
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x4014a0
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                      Time Stamp:0x674C57A4 [Sun Dec 1 12:33:40 2024 UTC]
                                                      TLS Callbacks:0x7890e0, 0x789090
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:81fb24115d5dd0de51b609f733724901
                                                      Instruction
                                                      mov dword ptr [00B75658h], 00000001h
                                                      jmp 00007FDCD4F84236h
                                                      nop
                                                      mov dword ptr [00B75658h], 00000000h
                                                      jmp 00007FDCD4F84226h
                                                      nop
                                                      sub esp, 1Ch
                                                      mov eax, dword ptr [esp+20h]
                                                      mov dword ptr [esp], eax
                                                      call 00007FDCD530BA96h
                                                      cmp eax, 01h
                                                      sbb eax, eax
                                                      add esp, 1Ch
                                                      ret
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      push ebp
                                                      mov ebp, esp
                                                      push edi
                                                      push esi
                                                      push ebx
                                                      sub esp, 1Ch
                                                      mov dword ptr [esp], 00A1D000h
                                                      call dword ptr [00B779A0h]
                                                      sub esp, 04h
                                                      test eax, eax
                                                      je 00007FDCD4F845F5h
                                                      mov ebx, eax
                                                      mov dword ptr [esp], 00A1D000h
                                                      call dword ptr [00B77A14h]
                                                      mov edi, dword ptr [00B779B4h]
                                                      sub esp, 04h
                                                      mov dword ptr [00B73028h], eax
                                                      mov dword ptr [esp+04h], 00A1D013h
                                                      mov dword ptr [esp], ebx
                                                      call edi
                                                      sub esp, 08h
                                                      mov esi, eax
                                                      mov dword ptr [esp+04h], 00A1D029h
                                                      mov dword ptr [esp], ebx
                                                      call edi
                                                      sub esp, 08h
                                                      mov dword ptr [008BD004h], eax
                                                      test esi, esi
                                                      je 00007FDCD4F84593h
                                                      mov dword ptr [esp+04h], 00B7302Ch
                                                      mov dword ptr [esp], 00B6E104h
                                                      call esi
                                                      mov dword ptr [esp], 00401580h
                                                      call 00007FDCD4F844E3h
                                                      lea esp, dword ptr [ebp-0Ch]
                                                      pop ebx
                                                      pop esi
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x7770000x2d90.idata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x77c0000x32944.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x763b800x18.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x7778100x61c.idata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x4bb95c0x4bba00208ee3f134adf43b69a67c30c36c92fcunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .data0x4bd0000x15f0e40x15f200285b7fb19aef319dbda883243c6cf48cFalse0.015593015752936989dBase III DBT, version number 0, next free block index 10, 1st item "\332\301z"0.2354105461677066IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rdata0x61d0000x1509a40x150a006bf79d96d546190ba9861bdbd1cff76fFalse0.4215087437337542data6.2741624061919605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .eh_fram0x76e0000x4d300x4e00ea6b6163b2e313db72a4c17b4353d2e8False0.3192608173076923data4.906360631443924IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .bss0x7730000x31800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .idata0x7770000x2d900x2e006233b460a75832b11085ba99742ae369False0.36795176630434784data5.450255772340319IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .CRT0x77a0000x300x200fe2a65d4187b984679c52ae93485940eFalse0.0625data0.2233456448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .tls0x77b0000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .reloc0x77c0000x329440x32a008f27117dabdb5f1ec1029eb3b39e39feFalse0.5072434413580247data6.6580607392142035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      DLLImport
                                                      ADVAPI32.dllCryptAcquireContextA, CryptAcquireContextW, CryptCreateHash, CryptDecrypt, CryptDestroyHash, CryptDestroyKey, CryptEnumProvidersW, CryptExportKey, CryptGenRandom, CryptGetHashParam, CryptGetProvParam, CryptGetUserKey, CryptHashData, CryptReleaseContext, CryptSetHashParam, CryptSignHashW, DeregisterEventSource, RegCloseKey, RegEnumKeyExA, RegNotifyChangeKeyValue, RegOpenKeyExA, RegOpenKeyExW, RegQueryValueExA, RegisterEventSourceW, ReportEventW, SystemFunction036
                                                      bcrypt.dllBCryptGenRandom
                                                      CRYPT32.dllCertCloseStore, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertGetEnhancedKeyUsage, CertGetIntendedKeyUsage, CertOpenStore, CertOpenSystemStoreA, CertOpenSystemStoreW
                                                      GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, SelectObject
                                                      gdiplus.dllGdipGetImageEncoders, GdipGetImageEncodersSize, GdiplusShutdown, GdiplusStartup
                                                      IPHLPAPI.DLLConvertInterfaceIndexToLuid, ConvertInterfaceLuidToNameA, FreeMibTable, GetAdaptersAddresses, GetBestRoute2, GetUnicastIpAddressTable, if_indextoname, if_nametoindex
                                                      KERNEL32.dllAcquireSRWLockExclusive, CancelIo, CloseHandle, CompareFileTime, ConvertFiberToThread, ConvertThreadToFiberEx, CreateEventA, CreateFiberEx, CreateFileA, CreateFileMappingA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreW, CreateThread, CreateToolhelp32Snapshot, DeleteCriticalSection, DeleteFiber, EnterCriticalSection, ExpandEnvironmentStringsA, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileW, FormatMessageW, FreeLibrary, GetACP, GetConsoleMode, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetEnvironmentVariableA, GetEnvironmentVariableW, GetFileAttributesA, GetFileType, GetLastError, GetLogicalDriveStringsA, GetModuleFileNameA, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetThreadLocale, GetTickCount64, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExA, GlobalMemoryStatusEx, HeapAlloc, HeapFree, InitializeConditionVariable, InitializeCriticalSection, IsBadReadPtr, IsDBCSLeadByteEx, K32EnumProcesses, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, MapViewOfFile, MoveFileExA, MultiByteToWideChar, OpenProcess, PeekNamedPipe, PostQueuedCompletionStatus, Process32First, Process32Next, QueryFullProcessImageNameA, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleA, ReadConsoleW, ReadFile, RegisterWaitForSingleObject, ReleaseSRWLockExclusive, ReleaseSemaphore, SetConsoleMode, SetFileCompletionNotificationModes, SetHandleInformation, SetLastError, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, SleepEx, SwitchToFiber, SystemTimeToFileTime, TlsAlloc, TlsGetValue, TlsSetValue, UnmapViewOfFile, UnregisterWait, VerSetConditionMask, VerifyVersionInfoW, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitNamedPipeA, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteFile, lstrlenA
                                                      msvcrt.dll__mb_cur_max, __setusermatherr, _findclose, _fullpath, _lock, _strnicmp, _unlock, getc, islower, isxdigit, localeconv, ungetc, vfprintf, _findnext, _findfirst, _open
                                                      ole32.dllCreateStreamOnHGlobal
                                                      SHELL32.dllSHGetKnownFolderPath
                                                      api-ms-win-crt-convert-l1-1-0.dllatoi, mbstowcs, strtol, strtoll, strtoul, wcstombs
                                                      api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
                                                      api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64, _unlink
                                                      api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
                                                      api-ms-win-crt-locale-l1-1-0.dllsetlocale
                                                      api-ms-win-crt-math-l1-1-0.dll_fdopen
                                                      api-ms-win-crt-private-l1-1-0.dllmemchr, memcmp, memcpy, memmove, strchr, strrchr, strstr, wcsstr
                                                      api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, __p___argc, __p___argv, __p___wargv, __p__acmdln, __sys_errlist, __sys_nerr, _assert, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _errno, _exit, _fpreset, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_invalid_parameter_handler, abort, exit, raise, signal, strerror
                                                      api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vsscanf, __stdio_common_vswprintf, _fileno, _fseeki64, _lseeki64, _wfopen, _write, fclose, feof, ferror, fflush, fgets, fopen, fputc, fputs, fread, fseek, ftell, fwrite, rewind, setvbuf, _write, _setmode, _read, _open, _fileno, _close
                                                      api-ms-win-crt-string-l1-1-0.dll_strlwr_s, isspace, isupper, memset, strcat, strcmp, strcpy, strcspn, strlen, strncat, strncmp, strncpy, strpbrk, strspn, tolower, wcscat, wcscmp, wcscpy, wcslen, _wcsnicmp, _stricmp, _strdup, _strdup
                                                      api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _difftime32, _difftime64, _gmtime64, _mktime64, _time32, _time64, _tzset, strftime
                                                      api-ms-win-crt-utility-l1-1-0.dll_byteswap_uint64, bsearch, qsort, rand, srand
                                                      USER32.dllCharUpperA, EnumDisplayMonitors, EnumWindows, FindWindowA, GetDC, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, GetWindowTextA, MessageBoxW, ReleaseDC, SendMessageA
                                                      WS2_32.dllWSACleanup, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAGetLastError, WSAIoctl, WSAResetEvent, WSASetEvent, WSASetLastError, WSAStartup, WSAStringToAddressW, WSAWaitForMultipleEvents, __WSAFDIsSet, accept, bind, closesocket, connect, gethostbyaddr, gethostbyname, gethostname, getpeername, getservbyname, getservbyport, getsockname, getsockopt, htonl, htons, inet_addr, inet_ntoa, ioctlsocket, listen, ntohl, ntohs, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 20, 2024 19:27:57.868851900 CET49704443192.168.2.534.226.108.155
                                                      Dec 20, 2024 19:27:57.868958950 CET4434970434.226.108.155192.168.2.5
                                                      Dec 20, 2024 19:27:57.869056940 CET49704443192.168.2.534.226.108.155
                                                      Dec 20, 2024 19:27:57.871938944 CET49704443192.168.2.534.226.108.155
                                                      Dec 20, 2024 19:27:57.871973038 CET4434970434.226.108.155192.168.2.5
                                                      Dec 20, 2024 19:27:59.653960943 CET4434970434.226.108.155192.168.2.5
                                                      Dec 20, 2024 19:27:59.658864021 CET49704443192.168.2.534.226.108.155
                                                      Dec 20, 2024 19:27:59.658889055 CET4434970434.226.108.155192.168.2.5
                                                      Dec 20, 2024 19:27:59.661221027 CET4434970434.226.108.155192.168.2.5
                                                      Dec 20, 2024 19:27:59.661439896 CET49704443192.168.2.534.226.108.155
                                                      Dec 20, 2024 19:27:59.682991028 CET49704443192.168.2.534.226.108.155
                                                      Dec 20, 2024 19:27:59.683135033 CET4434970434.226.108.155192.168.2.5
                                                      Dec 20, 2024 19:27:59.736290932 CET49704443192.168.2.534.226.108.155
                                                      Dec 20, 2024 19:27:59.736320019 CET4434970434.226.108.155192.168.2.5
                                                      Dec 20, 2024 19:27:59.760071039 CET49704443192.168.2.534.226.108.155
                                                      Dec 20, 2024 19:27:59.807326078 CET4434970434.226.108.155192.168.2.5
                                                      Dec 20, 2024 19:28:00.080439091 CET4434970434.226.108.155192.168.2.5
                                                      Dec 20, 2024 19:28:00.080579996 CET4434970434.226.108.155192.168.2.5
                                                      Dec 20, 2024 19:28:00.080641985 CET49704443192.168.2.534.226.108.155
                                                      Dec 20, 2024 19:28:00.083139896 CET49704443192.168.2.534.226.108.155
                                                      Dec 20, 2024 19:28:00.083161116 CET4434970434.226.108.155192.168.2.5
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 20, 2024 19:27:57.729675055 CET6285153192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:27:57.729819059 CET6285153192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:27:57.867384911 CET53628511.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:27:57.867477894 CET53628511.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:00.470320940 CET6285453192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:00.470402956 CET6285453192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:00.608503103 CET53628541.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:00.608742952 CET53628541.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:10.661931038 CET4960953192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:10.662062883 CET4960953192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:10.798788071 CET53496091.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:10.798800945 CET53496091.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:20.821434021 CET5396853192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:20.821521044 CET5396853192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:20.958388090 CET53539681.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:20.958427906 CET53539681.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:30.980231047 CET5484953192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:30.980331898 CET5484953192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:31.119600058 CET53548491.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:31.120579004 CET53548491.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:41.133914948 CET6065353192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:41.134001970 CET6065353192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:41.272356987 CET53606531.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:41.272376060 CET53606531.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:51.290076017 CET6065453192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:51.290150881 CET6065453192.168.2.51.1.1.1
                                                      Dec 20, 2024 19:28:51.429996014 CET53606541.1.1.1192.168.2.5
                                                      Dec 20, 2024 19:28:51.430011988 CET53606541.1.1.1192.168.2.5
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Dec 20, 2024 19:27:57.729675055 CET192.168.2.51.1.1.10xe005Standard query (0)httpbin.orgA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:27:57.729819059 CET192.168.2.51.1.1.10x1eaaStandard query (0)httpbin.org28IN (0x0001)false
                                                      Dec 20, 2024 19:28:00.470320940 CET192.168.2.51.1.1.10x749dStandard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:00.470402956 CET192.168.2.51.1.1.10xd7e6Standard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:28:10.661931038 CET192.168.2.51.1.1.10xa28bStandard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:10.662062883 CET192.168.2.51.1.1.10x74e4Standard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:28:20.821434021 CET192.168.2.51.1.1.10xe374Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:20.821521044 CET192.168.2.51.1.1.10xb90aStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:28:30.980231047 CET192.168.2.51.1.1.10x88aaStandard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:30.980331898 CET192.168.2.51.1.1.10x753cStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:28:41.133914948 CET192.168.2.51.1.1.10xabc5Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:41.134001970 CET192.168.2.51.1.1.10x583aStandard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      Dec 20, 2024 19:28:51.290076017 CET192.168.2.51.1.1.10x63c7Standard query (0)home.sevkx17vs.topA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:51.290150881 CET192.168.2.51.1.1.10x5c3Standard query (0)home.sevkx17vs.top28IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Dec 20, 2024 19:27:57.867477894 CET1.1.1.1192.168.2.50xe005No error (0)httpbin.org34.226.108.155A (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:27:57.867477894 CET1.1.1.1192.168.2.50xe005No error (0)httpbin.org98.85.100.80A (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:00.608503103 CET1.1.1.1192.168.2.50x749dName error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:00.608742952 CET1.1.1.1192.168.2.50xd7e6Name error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:28:10.798788071 CET1.1.1.1192.168.2.50x74e4Name error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:28:10.798800945 CET1.1.1.1192.168.2.50xa28bName error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:20.958388090 CET1.1.1.1192.168.2.50xe374Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:20.958427906 CET1.1.1.1192.168.2.50xb90aName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:28:31.119600058 CET1.1.1.1192.168.2.50x753cName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:28:31.120579004 CET1.1.1.1192.168.2.50x88aaName error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:41.272356987 CET1.1.1.1192.168.2.50x583aName error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      Dec 20, 2024 19:28:41.272376060 CET1.1.1.1192.168.2.50xabc5Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:51.429996014 CET1.1.1.1192.168.2.50x63c7Name error (3)home.sevkx17vs.topnonenoneA (IP address)IN (0x0001)false
                                                      Dec 20, 2024 19:28:51.430011988 CET1.1.1.1192.168.2.50x5c3Name error (3)home.sevkx17vs.topnonenone28IN (0x0001)false
                                                      • httpbin.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.54970434.226.108.1554431644C:\Users\user\Desktop\Set-up.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-12-20 18:27:59 UTC52OUTGET /ip HTTP/1.1
                                                      Host: httpbin.org
                                                      Accept: */*
                                                      2024-12-20 18:28:00 UTC224INHTTP/1.1 200 OK
                                                      Date: Fri, 20 Dec 2024 18:27:59 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 31
                                                      Connection: close
                                                      Server: gunicorn/19.9.0
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Credentials: true
                                                      2024-12-20 18:28:00 UTC31INData Raw: 7b 0a 20 20 22 6f 72 69 67 69 6e 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 0a 7d 0a
                                                      Data Ascii: { "origin": "8.46.123.189"}


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:13:27:56
                                                      Start date:20/12/2024
                                                      Path:C:\Users\user\Desktop\Set-up.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Set-up.exe"
                                                      Imagebase:0x990000
                                                      File size:8'020'992 bytes
                                                      MD5 hash:0A711206F96133C8D28CD99B5910D705
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:13:29:00
                                                      Start date:20/12/2024
                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 940
                                                      Imagebase:0xe0000
                                                      File size:483'680 bytes
                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      No disassembly